This is default featured slide 1 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 2 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 3 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 4 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 5 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
Sunday, September 25, 2011
How to Spoof Caller ID – Caller ID Spoofing
Thursday, September 22, 2011
Android vulnerabilities exposed [Video ]
Oberheide and Lanier are set to teach a two-day mobile security training course at SOURCE Barcelona this November where they will presumably refer to this and other Android vulnerabilities. Let's hope, for the sake of Android's reputation, that these things are resolved much sooner.
The second bug only affects the Samsung Nexus S smartphone. It lets attackers gain root access on the device, providing them with full control over the handset. Google has yet to address the security issues.
Wednesday, September 21, 2011
iPhone Skype XSS Vulnerability Lets Hackers Steal Phonebook [Video]
The problem is made more exploitable by the way Skype uses the embeddable WebKit browser; Skype developers have set the URI scheme for the embedded browser to "file://". This error allows an attacker to access the file system and read any file that the app would be allowed to read by the iOS application sandbox. One file that every iOS application has access to is the user's SQLlite AddressBook database. In a demonstration of the bugs, Phil Purviance, AppSec Consulting security researcher, showed how it was possible to extract the iPhone address book using the vulnerabilities.
Skype is aware of the issue and is working on a fix. “We are working hard to fix this reported issue in our next planned release, which we hope to roll out imminently,” Skype said in a statement.
Simple solution: Don't open text messages in the chat window, and check for a really quick update.
Tuesday, September 20, 2011
Droidsheep : Android Application for Session Hijacking
Droidsheep is free alternate of faceniff which is available on download droidsheep website for free. Its one click hijacking tool which supports
- Amazon.de
- facebook.com
- flickr.com
- twitter.com
- linkdein.com
- yahoo.com
- live.com
- google.de (only the non-encrypted services like "maps")
- You need an android-powered device, running at least version 2.1 of Android
- You need Root-Access on your phone (link)
- You need DroidShep (You can get it in the "GET IT" section)
Download Droidsheep
Monday, September 12, 2011
Common Codes for Nokia-CDMA
Software Version: *#837#
Software Version: *#9999#
CDMA Mode : *#7738#
Message sending options: *#66767#
Esn Number: *#92772689#
Current Channel: *#24#
Restart Phone: *#75681#
Restart Phone: *#75682#
Nokia 8887 Nam Programming :
Nam Set: *3001#12345#
Version: *#0000#
Evrc: *#3872#
Esn/Data/Timer: *#92772689#
SID: *#743#
Help: *#4357#
Slot Cycles: *#75681# , *#75682#
Nokia 8587 Nam Programming :
Nam Set: *#626#7764726#
A-Key: #8159357022#4579# (26 digits)
A-Key: #8159357022#4547# (20 digits)
Version: *#0000#
Version: *#837#
Vocoder: *#3872#
Change language: Menu 5, 3, 1
Change DM mode: *#7678#
Debug Screen: *#8378#
Debug: *#8380#
Field Test Menu: *#83788#
SPC Unlock, Factory Reset :
Full Factory Reset: *#7370#
Resets all settings including non-user changeable items (like SPC)
NOKIA TEST MODE:
1) Turn on the phone. Press *3001#12345#
2) Select Field Test and enable it..
3) Exit from NAM.. and restart your phone..
4) you will observe a new menu " Net Monitor "..
5) type appropriate group/display code.. ( 3101 for link info, 6101 for battery info )
6) enter 0000 to back.
Saturday, September 3, 2011
Increase Font Size On Nokia E50
You’ll need a memory card and a file manager (e.g. Y-Browser or ActiveFile).
1. Open your file manager and navigate to Z:\resource\Fonts
2. Check the names of the files (these are the fonts that are actually used); they have extension .ttf and most likely they are nosnr60.ttf, nssb60.ttf, nstsb60.ttf and S60ZDIGI.ttf; write them down, you’ll need them later
3. On your memory card create a folder called resource and inside it a folder called Fonts
4. Copy the new fonts to the Fonts folder on your memory card (there are numerous fonts available on the internet for free; try a few of them, experiment and see which fits the best)
5. Rename them in the following order: – nosnr60.ttf regular (normal) font – nssb60.ttf bold font – nstsb60.ttf font for titles
Note: if your font files have different names rename them accordingly. Font names on your memory card must match those on phone memory in Z:\resource\Fonts.
6. Reboot the phone
If you want to switch back to the default font simply erase the whole resource folder from your memory card. If you take your memory card out of the phone the default font will be used.
A Software can also increases font sizes use it for any s60...
Software: Font Magnifier
avialable at: http://shop.psiloc.com